Download PDF - IBM Redbooks
Download PDF - IBM Redbooks
Download PDF - IBM Redbooks
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
Index<br />
Numerics<br />
5 nines 105<br />
A<br />
access types 47<br />
ACS routines for SAP 177<br />
ADMIN stored procedures 45<br />
AIX 54<br />
application server instance 10, 12<br />
architecture of SAP NetWeaver with DB2 for z/OS 9<br />
AT-TLS policies 129<br />
audit policy 117, 119<br />
audit reports 120<br />
availability 105<br />
enhancements 37<br />
B<br />
backup 89<br />
installation considerations 191<br />
recovery management 89<br />
Backup Monitor 89<br />
bare metal 108<br />
BSDS SMS consideration 179<br />
buffer pools 87<br />
business continuity 17<br />
software considerations 166<br />
business value 6<br />
C<br />
CA certificate 126<br />
CAT 177<br />
catalog contention 32<br />
CCMS (Computing Center Management System) 83<br />
central services instance 11<br />
CI 178<br />
Collaborative Memory Management 102<br />
Computing Center Management System (CCMS) 83<br />
configuration<br />
PAGENT policy agent 128<br />
SAP installation 57<br />
SAPCL 65<br />
temporary space in SAP 176<br />
z/OS UNIX System Services 170<br />
z/VM monitoring 97<br />
connection trust attributes 133<br />
continuous availability 17<br />
continuous operation 17<br />
Cooperative Memory Management 102<br />
D<br />
data set protection 138<br />
data sharing 20<br />
considerations 72<br />
GDPS 21<br />
group 106<br />
member 106<br />
database administration guide 148<br />
database administrator 146<br />
separation of duties 114<br />
database instance 12<br />
Database Job Central Planning 89<br />
database roles feature 132<br />
database server 20<br />
DB2<br />
active logs, SMS consideration 179<br />
backup preparations 191<br />
data sharing and GDPS 21<br />
installation parameters 73<br />
migration considerations 67<br />
preparation for, installing, and customization 173<br />
SAP 2<br />
subsystem activity 84<br />
subsystem, building for SAP 173<br />
System z 2<br />
DB2 10<br />
audit policy 117<br />
database server, data stream encryption 124<br />
dataset protection 138<br />
DRDA secure port for SSL 131<br />
installation and migration 53<br />
performance and processor efficiency 34<br />
remote trusted connection 134<br />
scalability improvements 32<br />
security enhancements 113<br />
trusted security context and roles 132<br />
using SSL 126<br />
Virtual Storage Constraint Relief 31<br />
virtual storage constraint relief 31<br />
ZPARMS for SAP 190<br />
DB2 Connect 15<br />
DB2 VSAM data sets 177<br />
DBA Cockpit 83<br />
changes 40<br />
DBADM authority 115–116<br />
DBM1 monitoring 42<br />
DEF_CURR_DEGREE 51<br />
demilitarized zone 13<br />
DFSMS storage management 177<br />
dialog instances 12<br />
direction 130<br />
documentation 148<br />
collections and sources 148<br />
<strong>IBM</strong> 153<br />
migration 67<br />
SAP 150<br />
downtime 105<br />
DRDA secure port for SSL 131<br />
© Copyright <strong>IBM</strong> Corp. 2012. All rights reserved. 201